What is the generic term for a piece of malicious code?
Malware
Oops!
Check
Okay!
Check
15
Cyberbullying is especially harmful due to specific characteristics: Which of these is because it contributes to the digital footprint of the victim and the bully.
Permanent
Oops!
Check
Okay!
Check
15
What is the term for a low-talent hacker who uses easy, well-known techniques to exploit Internet security vulnerabilities.
Script-Kiddie
Oops!
Check
Okay!
Check
seesaw
Swap points!
Oops!
star
Double points!
Okay!
rocket
Go to first place!
Okay!
thief
Give points!
5
10
15
20
25
15
Cyberbullying is especially harmful due to specific characteristics: Which of these is because devices have constant communication with no respite for victims.
Persistent
Oops!
Check
Okay!
Check
15
A flaw in a computer program that makes it vulnerable is called a ___________?
Security Hole
Oops!
Check
Okay!
Check
banana
Go to last place!
Oops!
gift
Win 10 points!
Okay!
rocket
Go to first place!
Okay!
baam
Lose 25 points!
Oops!
15
Which role of cyberbullying is described here: someone aware of cyberbullying but not intervening
bystander
Oops!
Check
Okay!
Check
15
A piece of malware that holds your computer hostage until something is done is called ?
Ransomware
Oops!
Check
Okay!
Check
15
Using general knowledge of human behavior to trick users into breaking security rules is known as ?
Social Engineering
Oops!
Check
Okay!
Check
15
What does CIA stand for?
confidentially integrity availability
Oops!
Check
Okay!
Check
seesaw
Swap points!
Oops!
seesaw
Swap points!
Okay!
rocket
Go to first place!
Okay!
banana
Go to last place!
Oops!
15
A software program that monitors your computer usage without your knowledge:
spyware
Oops!
Check
Okay!
Check
15
The network of devices with the ability to connect and exchange data is known as ?